In this study, the general principles of choosing containers to create perfect steganographic systems, as well as the characteristics, types, volume, size, format, stability of containers against attacks are considered. The process of entering information into a container is described, and the stability of steganograms with respect to passive and active attacks is analyzed. The distinguishing aspects of the formats of modern graphic containers, the advantage and disadvantages of the Internet protocols TCP, IP, VoIP and SCTP which are used as containers are discussed. To determine the effect of containers on steganographic stability, a theoretical information model of steganographic system with a passive intruder has been suggested. The dependence of the stability of steganographic systems on the technology of introducing hidden messages into a container is explained and the probability distributions of containers and steganograms are analyzed. It was shown that the stability of steganographic systems depends on the probability distributions of containers and steganograms, and only in the case they are identically distributed, the steganographic system is completely stable.
steganographic system information hiding container steganogram confidential information intruder attack
In this study, the general principles of choosing containers to create perfect steganographic systems, as well as the characteristics, types, volume, size, format, stability of containers against attacks are considered. The process of entering information into a container is described, and the stability of steganograms with respect to passive and active attacks is analyzed. The distinguishing aspects of the formats of modern graphic containers, the advantage and disadvantages of the Internet protocols TCP, IP, VoIP and SCTP which are used as containers are discussed. To determine the effect of containers on steganographic stability, a theoretical information model of steganographic system with a passive intruder has been suggested. The dependence of the stability of steganographic systems on the technology of introducing hidden messages into a container is explained and the probability distributions of containers and steganograms are analyzed. It was shown that the stability of steganographic systems depends on the probability distributions of containers and steganograms, and only in the case they are identically distributed, the steganographic system is completely stable.
В статье рассмотрены общие принципы выбора контейнеров для создания совершенных стеганографических систем, а также характеристики, типы, объем, размер, формат, стойкость контейнеров к атакам. Описан процесс внесения информации в контейнер, проведен анализ устойчивости стеганограмм при пассивным и активным атакам. Было отмечено отличительные аспекты форматов современных графических контейнеров, преимущество и недастатки используемых интернет протоколов TCP, IP, VoIP и SCTP в качестве контейнера. Для определения влияния контейнеров на стеганографическую стойкость рассмотрен теоретико-информационную модель стеганографической системы с пассивным нарушителем. Изложена зависимость стойкости стеганографических систем от технологии внедрения скрытых сообщений в контейнер, проанализировано вероятностное распределение контейнеров и стеганограмм. Было показано, что стойкость стеганографических систем зависит от вероятностного распределения контейнеров и стеганограмм и только при их равенство стеганографическая система является совершенно стойкой.
Birincil Dil | İngilizce |
---|---|
Konular | Mühendislik |
Bölüm | Derleme Makalesi |
Yazarlar | |
Yayımlanma Tarihi | 31 Aralık 2020 |
Gönderilme Tarihi | 24 Eylül 2020 |
Yayımlandığı Sayı | Yıl 2020 Cilt: 4 Sayı: 3 |
Uluslararası 3B Yazıcı Teknolojileri ve Dijital Endüstri Dergisi Creative Commons Atıf-GayriTicari 4.0 Uluslararası Lisansı ile lisanslanmıştır.